Machine Learning techniques for Behavioral Feature Selection in Network Intrusion Detection Systems
Fecha
2021
Profesor Guía
Formato del documento
Articulo
ORCID Autor
Título de la revista
ISSN de la revista
Título del volumen
Editor
IEEE
Ubicación
ISBN
ISSN
item.page.issne
item.page.doiurl
Facultad
Facultad de Ciencias
Departamento o Escuela
Instituto de Estadistica
Determinador
Recolector
Especie
Nota general
No disponible para descarga
Resumen
Information systems are prone to receiving multiple types of attacks over the network. Therefore, Network Intrusion Detection Systems (NIDSs) analyze the behavior of the network traffic to detect anomalies and eventual cyberattacks. The NIDS must be able to detect these cyberattacks in an efficient and effective manner based on a set of features where it is expected that the performance depends on both the selected features and the machine learning technique used. The main goal of this work is to identify the most relevant characteristics required to detect, with a high sensitivity and precision, between normal traffic and a network intrusion, together with the most relevant features associated to the identification of a specific type of attack. In this work, a comparative study of different decision tree-based machine learning techniques combined with several feature selection techniques in order to accomplish the goal. Random Forest and the XGBoost achieved a performance that reaches up to 98.5% in the F-measure when the complete set of features were used. Results show the performance was just slightly reduced to 98% when the 10 most relevant features were used. Moreover, results also show that the model using only the 10 most relevant features was able to separately identify the type of attack with a performance of at least 90% in the F-measure. We conclude that it is possible to obtain and rank a subset of the most relevant features that characterize the intrusion pattern in the network traffic in order to support the decision of how many features to include during runtime under a real network environment.
Descripción
Lugar de Publicación
Auspiciador
Palabras clave
COMPUTER NETWORK SECURITY, DECISION TREES, FEATURE SELECTION, LEARNING (ARTIFICIAL INTELLIGENCE)